use axum::extract::State; use axum_client_ip::InsecureClientIp; use base64::{Engine as _, engine::general_purpose}; use ruma::{ CanonicalJsonValue, OwnedUserId, UserId, api::{ client::error::ErrorKind, federation::membership::{RawStrippedState, create_invite}, }, events::room::member::{MembershipState, RoomMemberEventContent}, serde::JsonObject, }; use tuwunel_core::{ Err, Error, Result, err, extract_variant, matrix::{Event, PduCount, PduEvent, event::gen_event_id}, utils, utils::hash::sha256, warn, }; use crate::Ruma; /// # `PUT /_matrix/federation/v2/invite/{roomId}/{eventId}` /// /// Invites a remote user to a room. #[tracing::instrument(skip_all, fields(%client), name = "invite")] pub(crate) async fn create_invite_route( State(services): State, InsecureClientIp(client): InsecureClientIp, body: Ruma, ) -> Result { // ACL check origin services .event_handler .acl_check(body.origin(), &body.room_id) .await?; if !services .server .supported_room_version(&body.room_version) { return Err(Error::BadRequest( ErrorKind::IncompatibleRoomVersion { room_version: body.room_version.clone() }, "Server does not support this room version.", )); } if let Some(server) = body.room_id.server_name() { if services .config .forbidden_remote_server_names .is_match(server.host()) { return Err!(Request(Forbidden("Server is banned on this homeserver."))); } } if services .config .forbidden_remote_server_names .is_match(body.origin().host()) { warn!( "Received federated/remote invite from banned server {} for room ID {}. Rejecting.", body.origin(), body.room_id ); return Err!(Request(Forbidden("Server is banned on this homeserver."))); } let mut signed_event = utils::to_canonical_object(&body.event) .map_err(|_| err!(Request(InvalidParam("Invite event is invalid."))))?; let invited_user: OwnedUserId = signed_event .get("state_key") .try_into() .map(UserId::to_owned) .map_err(|e| err!(Request(InvalidParam("Invalid state_key property: {e}"))))?; if !services .globals .server_is_ours(invited_user.server_name()) { return Err!(Request(InvalidParam("User does not belong to this homeserver."))); } // Make sure we're not ACL'ed from their room. services .event_handler .acl_check(invited_user.server_name(), &body.room_id) .await?; services .server_keys .hash_and_sign_event(&mut signed_event, &body.room_version) .map_err(|e| err!(Request(InvalidParam("Failed to sign event: {e}"))))?; // Generate event id let event_id = gen_event_id(&signed_event, &body.room_version)?; // Add event_id back signed_event.insert("event_id".to_owned(), CanonicalJsonValue::String(event_id.to_string())); let sender: &UserId = signed_event .get("sender") .try_into() .map_err(|e| err!(Request(InvalidParam("Invalid sender property: {e}"))))?; if services.metadata.is_banned(&body.room_id).await && !services.users.is_admin(&invited_user).await { return Err!(Request(Forbidden("This room is banned on this homeserver."))); } if services.config.block_non_admin_invites && !services.users.is_admin(&invited_user).await { return Err!(Request(Forbidden("This server does not allow room invites."))); } let mut invite_state: Vec<_> = body .invite_room_state .clone() .into_iter() .filter_map(|s| extract_variant!(s, RawStrippedState::Stripped)) .collect(); let mut event: JsonObject = serde_json::from_str(body.event.get()) .map_err(|e| err!(Request(BadJson("Invalid invite event PDU: {e}"))))?; event.insert("event_id".to_owned(), "$placeholder".into()); let pdu: PduEvent = serde_json::from_value(event.into()) .map_err(|e| err!(Request(BadJson("Invalid invite event PDU: {e}"))))?; invite_state.push(pdu.to_format()); // If we are active in the room, the remote server will notify us about the // join/invite through /send. If we are not in the room, we need to manually // record the invited state for client /sync through update_membership(), and // send the invite PDU to the relevant appservices. if !services .state_cache .server_in_room(services.globals.server_name(), &body.room_id) .await { let count = services.globals.next_count(); services .state_cache .update_membership( &body.room_id, &invited_user, RoomMemberEventContent::new(MembershipState::Invite), sender, Some(invite_state), body.via.clone(), true, PduCount::Normal(*count), ) .await?; drop(count); for appservice in services.appservice.read().await.values() { if appservice.is_user_match(&invited_user) { services .sending .send_appservice_request( appservice.registration.clone(), ruma::api::appservice::event::push_events::v1::Request { events: vec![pdu.to_format()], txn_id: general_purpose::URL_SAFE_NO_PAD .encode(sha256::hash(pdu.event_id.as_bytes())) .into(), ephemeral: Vec::new(), to_device: Vec::new(), }, ) .await?; } } } Ok(create_invite::v2::Response { event: services .federation .format_pdu_into(signed_event, Some(&body.room_version)) .await, }) }